European Journal of Business Science and Technology 2017, 3(2):81-89 | DOI: 10.11118/ejobsat.v3i2.105

Challenges and Vulnerabilities of Analysing Cybercrime Costs

Jūratė Kuklytė1
1 Vytautas Magnus University, Kaunas, Lithuania

Recent studies have underlined a limited scope of research published with regard to the impact of cybercrimes, which is investigated by applying the scientific literature analysis and surveys. This paper focuses on in-depth research on cybercrime costs by analysing the information from selected online materials in order to reveal a research gap. To support the contributions of the research in the field, two methods, namely, literature review and statistical analysis were employed. The findings reveal that several interested parties such as independent IT companies, governmental and non-governmental institutions have conducted various surveys to identify the impact of cyberattacks. The main challenges and vulnerabilities of analysing cybercrime costs can be overcome by further investigations.

Keywords: cybercrime cots, cyber attack, OLS regression
JEL classification: K24, M21

Published: December 31, 2017  Show citation

ACS AIP APA ASA Harvard Chicago IEEE ISO690 MLA NLM Turabian Vancouver
Kuklytė, J. (2017). Challenges and Vulnerabilities of Analysing Cybercrime Costs. European Journal of Business Science and Technology3(2), 81-89. doi: 10.11118/ejobsat.v3i2.105
Download citation

References

  1. Bollen, K. A. and Stine, R. 1990. Direct and Indirect Effects: Classical and Bootstrap Estimates of Variability. Sociological Methodology, 115-140. Go to original source...
  2. Bossler, A. M. and Holt, T. J. 2009. On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory. International Journal of Cyber Criminology, 3 (1), 400-420.
  3. Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A. and Sastry, S. 2009. Challenges for Securing Cyber Physical Systems. In Workshop on Future Directions in Cyber-Physical Systems Security, Vol. 5.
  4. Cashell, B., Jackson, W. D., Jickling, M. and Webel, B. 2004. The Economic Impact of Cyber-Attacks. Congressional Research Service Documents. Washington DC. [online]. Available at: http://www.au.af.mil/au/awc/awcgate/crs/rl32331.pdf. [Accessed 2017, October 30].
  5. Cavusoglu, H., Mishra, B. and Raghunathan, S. 2004. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. International Journal of Electronic Commerce, 9 (1), 69-104. Go to original source...
  6. Center of Strategic and International Studies. 2014. Net Losses: Estimating the Global Cost of Cybercrime. [online]. Available at: https://www.scribd.com/document/228803026/Rp-Economic-Impact-Cybercrime2. [Accessed 2017, October 17].
  7. Data Breaches. 2012. Statement from ESingles about MilitarySingles.com. [online]. Available at: https://www.databreaches.net/updatestatement-from-esingles-about-militarysinglescom/. [Accessed 2017, October 30].
  8. de Werra, J. and Studer, E. 2017. Regulating Cyber Security: What Civil Liability of Cyber Attacks? Expert Focus, 17 (8), 511-517.
  9. Findlay, V. 2015. Cyber-Threat Versus Cyber-Risk: Performing Adequate Analysis. [online]. Available at: https://www.researchgate.net/publication/276284211_Cyber-Threat_versus_Cyber-Risk_Performing_Adequate_Analysis. [Accessed 2017, November 1].
  10. Fletcher, N. 2007. Challenges for Regulating Financial Fraud in Cyberspace. Journal of Financial Crime, 14 (2), 190-207. Go to original source...
  11. Furnell, S., Emm, D. and Papadaki, M. 2015. The Challenge of Measuring Cyber-Dependent Crime. Computer Fraud & Security, 10, 5-10. Go to original source...
  12. Gol, M. and Abur, A. 2013. Identifying Vulnerabilities of State Estimators Against Cyber-Attacks. [online]. Available at: http://ieeexplore.ieee.org/abstract/document/6652124/. [Accessed 2017, November 1].
  13. Hills, M. and Batchelor, G. 2015. Culturing Defensive Immunity: Hardening Psychological Targets Against Cyber Attack. In: Abouzakhar, N. (ed.). Proceedings of The 14th European Conference on Cyber Warfare and Security ECCWS-2015, pp. 95-103.
  14. Jardine, E. 2015. Global Cyberspace is Safer Than You Think: Real Trends in Cybercrime. [online]. Available at: http://boletines.prisadigital.com/SSRN-id2634590.pdf. [Accessed 2017, October 29].
  15. Kawanaka, T., Matsumaru, M. and Rokugawa, S. 2014. Software Measure in Cyber-Attacks on Production Control System. Computers & Industrial Engineering, 76, 378-386. DOI: https://doi.org/10.1016/j.cie.2014.08.008. Go to original source...
  16. Kim, W., Jeong, O.-R., Kim, C. and So, J. 2011. The Dark Side of the Internet: Attacks, Costs and Responses. Information Systems, 36 (3), 675-705. DOI: https://doi.org/10.1016/j.is.2010.11.003. Go to original source...
  17. Kleiner, A., Nicholas, P. and Sullivan, K. 2013. Linking Cybersecurity Policy and Performance. Microsoft Trustworthy Computing. [online]. Available at: http://www.ilsole24ore.com/pdf2010/SoleOnLine5/_Oggetti_Correlati/Documenti/Tecnologie/2013/02/SIR-Special-Edition-Security-Atlaswhitepaper.pdf. [Accessed 2017, October 30].
  18. Kovacs, E. 2012. CSS Corp Site Hacked by LulzSec, Database Leaked. [online]. Available at: http://news.softpedia.com/news/CSS-CorpSite-Hacked-by-LulzSec-Database-Leaked261041.shtml. [Accessed 2017, October 30].
  19. Leeuw, F. L. and Leeuw, B. 2012. Cyber Society and Digital Policies: Challenges to Evaluation? Evaluation, 18 (1), 111-127. Go to original source...
  20. Levi, M. and Leighton Williams, M. 2013. Multiagency Partnerships in Cybercrime Reduction: Mapping the UK Information Assurance Network Cooperation Space. Information Management & Computer Security, 21 (5), 420-443. Go to original source...
  21. Luo, X. and Liao, O. 2009. Ransomware: A New Cyber Hijacking Threat to Enterprises. Handbook of Research on Information Security and Assurance. IGI Global, 1-6. Go to original source...
  22. Miao, L. and Li, S. 2017. Cyber Security Based on Mean Field Game Model of the Defender: Attackerstrategies. International Journal of Distributer Sensor Networks, 13 (10), 1-8. Go to original source...
  23. Musman, S., Temin, A., Tanner, M., Fox, D. and Pridemore, B. 2010. Evaluating the Impact of Cyber Attacks on Missions. In International Conference on Cyber Warfare and Security, p. 446. Academic Conferences International Limited. Go to original source...
  24. NATO. 2013. The History of Cyber Attacks - A Timeline. [online]. Available at: https://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm. [Accessed 2017, October 30].
  25. Ponemon Institute. 2016. Cost of Cyber Crime Study & the Risk of Business Innovation. [online]. Available at: https://saas.hpe.com/sites/default/files/assets/4AA6-8392ENW.pdf. [Accessed 2017, September 30].
  26. Reyns, B. W. 2010. A Situational Crime Prevention Approach of Cyberstalking Victimization: Preventive Tactics for Internet Users and Online Place Managers. Crime Prevention and Community Safety, 12, 99-118. Go to original source...
  27. Saxena, N., Chukwuka, V., Xiong, L. and Grijalva, S. 2017. CPSA: A Cyber-Physical Security Assessment Tool for Situational Awereness in Smart Grid. In ACM CCS Workshop (CPS-SPC), Dallas, USA. [In press]. Go to original source...
  28. Smith, K. T., Smith, M. L. and Smith, J. L. 2011. Case Studies of Cybercrime and its Impact on Marketing Activity and Shareholder Value. Academy of Marketing Studies Journal, 15 (2), 67-81.
  29. Szoldra, P. 2015. The 9 Worst Cyber Attacks in 2015. [online]. Available at: http://www.businessinsider.com/cyberattacks-2015-12/#hackers-breached-the-systems-of-the-healthinsurer-anthem-inc-exposing-nearly-80million-personal-records-1. [Accessed 2017, October 31].
  30. Van Niekerk, B. 2016. Suppression of Cyber-Defences. In IST-Africa Week Conference, IEEE, pp. 1-12. Go to original source...
  31. Ventre, D. 2013. Cyberwar and Information Warfare. John Wiley & Sons, Hoboken, NJ, USA. Go to original source...
  32. Woolridge, J. M. 2006. Cluster-Sample Methods in Applied Econometrics: An Extended Analysis. [online]. Available at: http://econ.ucsb.edu/~doug/245a/Papers/Cluster%20Sample%20Methods%20in%20Applied%20Econometrics.pdf. [Accessed 2017, October 17].

This is an open access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.